Seagate Drive Firmware Security Overview - MSST …storageconference.us/2015/Presentations/Anderson.pdf · Seagate Drive Firmware Security Overview Dave Anderson, ... Authenticated
Post on 09-Aug-2018
224 Views
Preview:
Transcript
Seagate Confidential 1Seagate Confidential
Seagate
Drive Firmware Security Overview
1
Dave Anderson, Enterprise Storage
Seagate Confidential
“Accept the security
breach or clean a litter
box.
Take your pick…”
Security is a Trade-Off …!
Seagate Confidential
SED Cryptography and Completeness
Self Encrypting Drive development brought clear recognition of need
Encrypting data is useless unless back doors into drive were locked
Firmware must be protected
Diagnostics must be controlled
Self Encrypting Drives brought needed tools
Using standardized crypto techniques & algorithms enabled superior
protection of firmware
Eventually retrofitted into all non-SED drives
Seagate Confidential
What’s Inside One of These Drives:
Read
Write
TCG
SPSP SP
SPSP
SP
SPSP
SPSP
ASIC
Industry standard
protocol to access
security services,
methods & data.
Supports secure
communication & strong
authentication
Method ACL
…
Create User1
Get User2
Set User1
…
Data TableCol1 Col2
Row1
Row2
row3
Data TableCol1 Col2
Row1
Row2
row3
User Authentication
User1 Password
User 2 Challenge response
Security Providers = Logical “SmartCards”
Isolated from all others & to be securely issued
Uncircumventable access
control
Signed firmware
AES encryption in ASIC
Cryptographic methods:
AES,RSA,RNG, SHA-1,
SHA-256…
High Quality RNG
partly derived from
media signals
6Seagate Confidential
Power ON: SED remains LOCKED
Power OFF: SED LOCKS automatically
Authentication Key (Password) Unlocks the drive
Here is the
un-encrypted
text
un-encrypted
text
Write and Read data allowed
Self-Encrypting Drive Basics
Write
Read
Authentication
Key source
P%k5t$
@sg!7#x1)
#&%
Locking + encryption = security
•Locking only is easily hacked (ATA has had this for years)
•Encryption only does not prevent prevent access to data
Seagate Confidential
EncryptedUser Data
Hashed AK
Encrypted DEK
Correct AK?
Storage Server
Yes
Drive
responds to
No Read or
Write Reqs
No
Clear Data
Hash AK
Authentication in the Drive
=Unlock
HDD
AK decrypts
DEKDEK encrypts and
decrypts User Data
AKAuthentication Key
DEKData Encryption
Key
7
Seagate Confidential
Seagate Instant Secure Erase
Xe
!
Data After Erase Data on Drive
Re-encryption (After Erase)
New DEK
%$#@bdelijrui
l.skd%$#@i&&
6544ty899#@&$
%$#@bdelijrui
l.skd%$#@i&&
6544ty899#@&$
User Data Data on Drive
Encryption Process
DEK
The quick brown
fox jumps over
the lazy dog
Change DEK
Description
Instant Secure Erase changes the drive’s Data Encryption Key
(DEK).
Data encrypted with previous key is unintelligible when
“decrypted” with new key
Benefits
Instantaneous erase for secure disposal or repurposing
All spares, all virtual copies, Everything written with the
original Key is instantly securely erased!
Seagate Confidential 9
Seagate led the industry with Media Sanitization Standards for Crypto Erase
Federal and International Standards now released
NIST 800-88 is the unified Federal Standard
ISO 27040 is the international standard.
NIST 800-57 defines algorithm longevity.
Media Sanitization Standards
Seagate Confidential
• No clear text secrets on the drive.
• Cipher text is never revealed.
• Authentication blocking after X attempts – Power Cycle required.
• Access control credentials are separated from the encryption key
• Additional credential wrap with HW Root Key.
Encryption and Authentication Basics
Client or Controller
HDD secrets OS, user data
Seagate Confidential
HDD security services can establish secure channel
– Can pass through untrusted BIOS, OS, app, WWW
– Can create session keys & secure sessions
– Can issue and respond to challenge/response sequences
– Supports PKI signing and verification
– Supports MAC & HMAC
– Has X.509 certificates for authentication
Root of Trust & Secure Communications
Internet
11
Seagate Confidential
Secure Firmware Download
Receives & downloads new firmware, current
firmware validates signature on downloaded firmware
using public key
Requires cooperation of drive owner: Drive must be unlocked!
Firmware download allows only Seagate signed (using RSA2048 and SHA-256) firmware.
To load new controller firmware onto the drive, the drive verifies the integrity and authenticity of the firmware,
using a replay resistant protocol exchange, before activating it.
ROM boot code verifies firmware on each power on.
Field Engineer authenticates drive to Seagate
serverFirmware signed
with private key
Seagate Confidential
Authenticated Diagnostics Command Access
FA Engineer signs-in, sends signed challenge to device
employs Diagnostics
Requires cooperation of drive owner: Drive must be unlocked!
Each drive is assigned an unchanging, unique security ID at manufacturing time.
Drives ship with the Diagnostic Port locked and with no Diagnostic commands. Diagnostics Port unlock via
authentication through a Seagate Secure Server.
All drive protection related information is cryptographically protected on the media.
Non-repudiation log maintained for all security management activities
FA Engineer gets access to diagnostics
Seagate Confidential
My Thoughts on Protecting Firmware: Key to Drive Business
You cannot outsmart the world
Secrets are eventually found out
See Brian Williams, Gary Hart, etc
Obviously NSA cannot keep a secret (Snowden)
Thinking you can is clearly no basis for intelligent action
Seagate led industry to drive encryption
Compromised firmware would threaten our leadership
Would waste millions of dollars of technical & market development
Might open the door for a competitor to leapfrog us in SED business
Our whole business depends on our firmware
If it were untrustworthy, our very existence would be threatened
Too much to risk for allowing any compromise whatsoever
top related